C:\Users\fernando\source\repos\FakeSoftAim\FakeSoftAim\obj\Debug\SoftEXT.pdb
Static task
static1
Behavioral task
behavioral1
Sample
V4 (1).zip
Resource
win11-20240709-en
General
-
Target
V4 (1).zip
-
Size
1.4MB
-
MD5
feb2d06b26af337b9f428c26ecc28d15
-
SHA1
2496113261a55ef2425921c3f99c2c2c6f8bc33b
-
SHA256
6d6e08c0d1525b743f26316aa6cffdfde94ff743339943d8b644e57b42f6a0f6
-
SHA512
61e60135527fb99c5f8ff8c62df4517dbab057b4e887f520372584422d9c74da7edfef6ee153fd01652bbd6bb0d45927422688ca0a267fb4f64f8c082a986e49
-
SSDEEP
24576:10tLfVhHmF8QpmAcv2Wpu8wDf39oEleft+R2CldoShjZWnDRePeilRrXC2LG:iOFZmAcPpdHNgtZWDReGifrC2LG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/V4.exe
Files
-
V4 (1).zip.zip
Password: 05ApYwLvwSnior8XbldbGbMTYtEOTV4M
-
README.txt
-
V4.exe.exe windows:4 windows x86 arch:x86
Password: 05ApYwLvwSnior8XbldbGbMTYtEOTV4M
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
auth/key
-
configs/default.cfg
-
spoofer/ids
-
spoofer/reset.bat
-
spoofer/spoof.bat